Mozilla Firefox 2.0, possibly only when running on Windows, allows remote attackers to bypass the Phishing Protection mechanism by representing an IP address in (1) dotted-hex, (2) dotted-octal, (3) single decimal integer, (4) single hex integer, or (5) single octal integer format, which is not captured by the blacklist filter.
References
Link | Resource |
---|---|
http://sla.ckers.org/forum/read.php?13,2253 | Exploit |
https://bugzilla.mozilla.org/show_bug.cgi?id=356355 | Exploit |
Configurations
Information
Published : 2007-02-07 03:28
Updated : 2008-09-05 14:16
NVD link : CVE-2006-6971
Mitre link : CVE-2006-6971
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
mozilla
- firefox